. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.

Slides:



Advertisements
Similar presentations
Login The process of identifying oneself on a computer,usually by entering ones username or password.
Advertisements

Cambridge Nationals R001 Revision Guide – June 2014.
Chapter 1 Introduction to Computers p. 6.
What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
Your Website Chat & Live Customer Support Solution "Instant Customer GratificationSM" Brought to you by: Affordable Business Productivity and Communications.
Dictionary By Thomas Slack. Automatic number plate recognition Automatic Number Plate Recognition (ANPR) is a surveillance method that uses optical character.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Threats to I.T Internet security By Cameron Mundy.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
ICT at Work Global Communication.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Or… being a decent person.  It is all too easy to forget that what you type in the privacy of your own home, or on your phone, can end up plastered anywhere.
Methods of communication
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
Using SWHS: The AUP [Acceptable Use Policy]
Creating Web Pages Overview. Design – Start with a Purpose Before you start any web page, you need to design the website. The first question that should.
Acceptable Use, Legal Notices and Privacy June 9, 2011.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
00870B2F.0/Internet%20Safety.jpg.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
By..Chaim. How is Twitter different from SMS messages? Twitter is a website. Its users to send and read messages called tweets. You can share briefly.
University Health Care Computer Systems Fellows, Residents, & Interns.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
Technology Overview Kim Davis Coordinator of Technology Support Services.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Protecting Students on the School Computer Network Enfield High School.
Welcome Utree Phone Manual. Intro Thankyou for purchasing our Utree mobile This user-guide has been specially designed to help you get to know the functions.
How To Automate At Least 80% Of Your Online Business With.
Acceptable Use Policy==Safe and responsible users.
NEW TECHNOLOGY Using Twitter in the classroom
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
What’s the Big Deal about Internet Privacy Marrs Computer Club.
Networks. Learning Objectives: By the end of this lesson you should be able to:
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Bullying Project Kalene, Roz, Tanya. INTASC STANDARD Standard #3: Learning Environments The teacher works with others to create environments that support.
Software. Because databases can get very big, it is important to decide exactly what is going to be stored in each field. Fields can be text, number,
Policies and Security for Internet Access
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
1. Please double click on the highlighted LAB OPTION for proper log in Successfully logged in Total time earned for the current semester will be displayed.
Welcome. Registration complete? CQC Inspection visit Routine Responsive Themed.
COURSE DESCRIPTION: This course is designed to introduce the students to new and emerging technologies that are impacting the way we input information.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Use this to send your letters from one computer to another.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Using the Computer Responsibly
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
The Internet Industry Week Two.
How To Automate At Least 80% Of Your Online Business With
COOKIES.
Latest Updates on BlackHawk Mines Music : Privacy Policy
What Is Functionality Testing and How Does It Work?
Technology: Legal and Ethical Issues
Safety in the Digital World
DIRECTSTAR MONEY PROGRAM
Felix’s Technology Dictionary
AUP, EDP, & Centralized Printing
Communicating in the IT Industry
Presentation transcript:

There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the exact position of the technician. But the GPS facility must be turned on for this to work. 2. Mobile phone positioning – uses a minimum of 3 mobile phone masts to calculate the technician’s position. This method will work as long as the phone is turned on. Ethical thought – finding the position of a mobile phone and the person using it, can invade the privacy of the phone user. You can locate someone without their permission.

A key logger is a piece of hardware or software that records the use of a computer by an employee. It can include keyboard use, websites visited and documents opened. Employees leave an electronic trail of their computer use. All of this can be achieved without the employees knowing!!! Ethical thought – should employees use of computers at work be monitored without their knowledge?

Cable Ties LTD can record the telephone calls and SMS messages made from the technician’s smartphone. This means they have recorded evidence of all the technician’s use of the smartphone – both business and personal. This evidence could be used at a later date if needed. Recorded calls can also be used for training purposes for new technicians to train them how to deal with customers. Cables Ties can monitor if the technician has kept to the Acceptable Use Policy (AUP) they signed when they took the smartphone. Ethical thought – should employees use of their smartphones at work be monitored?

CCTV cameras can be used to monitor what employees are doing. CCTV camera can be placed throughout the building and monitor employees on their breaks. Ethical thought – should employees at work be monitored when they are on their free time? ID badges can be used to monitor employees as they move around the building. Badges can be set to only allow staff access to certain areas or rooms. An electronic trail can be kept to see where employees have been. Ethical thought – should employees movement around the building be monitored at all times?

A cookie is a text file that can be read using a program such as Notepad. The file usually contains 2 pieces of information: a site name and a user ID. When a website is first accessed a cookie can be downloaded onto the computer and the next time the website is accessed the computer checks to see if it has a cookie from that website. The computer then sends a message to the website telling it the computer it has accessed that website before. The website can then personalise the page and this process continues each time the website is accessed. Some cookies will also contain extra information such as, how long is spent on the website, what links are clicked and what is put in the shopping cart. At present every website has to declare if it uses cookies and the user has to accept them. Ethical thought – should websites use cookies at all and track your purchases etc.